Computer News: MIT researchers devise a way to evaluate cybersecurity methods
Posted: Sun Jul 16, 2023 8:58 pm
A savvy hacker can obtain secret information, such as a password, by observing a computer program’s behavior, like how much time that program spends accessing the computer’s memory. Security approaches that completely block these “side-channel attacks” are so computationally expensive that they aren’t feasible for many real-world systems. Instead, engineers often apply what are known as obfuscation schemes that seek to limit, but not eliminate, an attacker’s ability to learn...
Read more
Read more